| Vulnerability Name: | CVE-2020-27348 (CCN-192652) | ||||||||||||
| Assigned: | 2020-10-26 | ||||||||||||
| Published: | 2020-10-26 | ||||||||||||
| Updated: | 2020-12-14 | ||||||||||||
| Summary: | In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43.1+16.04.1, and prior to 2.43.1+18.04.1. | ||||||||||||
| CVSS v3 Severity: | 6.8 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L) 5.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 4.4 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-427 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2020-27348 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugs.launchpad.net/bugs/1901572 Source: CCN Type: Snapcraft Bug #1901572 snapd vulnerable to Library Injection from CWD Source: XF Type: UNKNOWN snapcraft-cve202027348-code-exec(192652) Source: CCN Type: snapcraft GIT Repository project_loader, formatting_utils: take empty env values into account #3345 Source: MISC Type: Third Party Advisory https://github.com/snapcore/snapcraft/pull/3345 Source: MISC Type: Patch, Third Party Advisory https://usn.ubuntu.com/usn/usn-4661-1 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||